Infrastructure & Application Security - Recommendations
Backups
All product databases must be regularly backed up to an offsite, at least once daily, to Azure or equivalent cloud location (not reachable from the same network and credentials, to protect from malware and ransomware attacks).
Network Security
All product installed VMs must be protected with secured Firewall, that allows only port 443 to internet
Only Hybr Website VM should have port 443 opened and accessible from outside (internet) via FireWall and FrontEnd Subnet and Load Balancer. No other port(s) of HYBR should be exposed via internet to outside such as RDP.
No other ports should be exposed to outside (internet), except in the following cases:
Hybr using Console Connect Feature with multiple RDP Gateways (Guacamole)
List the specific ports required to be open for this and allow those only to the respective VM Ip Address
All product APIs must be inside a secured backend subnet, behind firewall. Only accessible to each other inside the secured backend subnet and from HYBR Website VMs from frontend subnet. No services or VMs from backend subnet should be reachable from outside (internet).
Only Exception is when there is an external integration with HYBR API or Billing API. And in these cases, enable Access via external facing Load Balancer and Firewall to ONLY specific Remote IP Address and specific ports that needs access to these service APIs.
SQL Server VM(s) must be behind a secured firewall in the backend subnet.
At NO circumstances ANY SQL VM Ports should be reachable from outside (internet). Ensure special consideration is given to review firewall rules to explicitly DENY ALL ACCESS TO SQL SERVER VM Ip Address from internet.
Only specific IP Address from frontend subnet for HYBR Website VMs and specific IP Address from backend subnet for other services and APIs should be allowed to ONLY SQL SERVER PORT TCP 1433.
Secured Configuration
All APIs must be configured to use ONLY HTTPS
All web.config and application configuration settings must be encrypted
All secured settings stored in the database must be encrypted
Monitoring
Set up alerts for critical infrastructure and services such as
Disk Free Capacity for VMs and SQL Server Data
Windows Service Status
IIS Website Status for all web applications and APIs
SQL Server DB Maintenance
Ensure scheduled tasks exist for controlling Log file growth, in conjunction with backup tasks
Periodic review of SQL Server Disk free capacity and performance optimizations such as using SSD disks and so on
Cloud Assert Database and log files need to be stored in non-System drive
Failover cluster:
SQL Server Failover Clustering must be configured for all production workloads and proper monitoring must be configured to take required action(s) when there is failover
Last updated